Two Administrations and Congress Dismantled the Constitution – How Can It Be Restored?

Subject: Two Administrations and Congress Dismantled the Constitution – How Can It Be Restored?

Drastic Erosion of Citizen Privacy Since 9/11

Since the events of September 11, 2001, actions by successive U.S. administrations – backed by legislation such as the Patriot Act and the FISA Amendments Act (FAA) – have eroded privacy provisions guaranteed under the U.S. Constitution. Lawsuits challenging these actions have languished, with the U.S. Supreme Court having declined to hear the one case to reach it for review, Clapper vs. Amnesty International.

Post-9/11 DOJ Legal Opinions Roll Back Rights

How did America manage to arrive at such a wretched state of affairs? Following the 9/11 attack, the Office of Legal Counsel (OLC) at the Department of Justice issued a series of legal opinions asserting that the President’s commander-in-chief powers vis-a-vis the so-called “Global War on Terror” were not to be challenged by the legislative or judicial branches. The DOJ based its opinion regarding the President’s executive power on its broad interpretation of Article 2 of the Constitution.

Then, Vice President Dick Cheney stated in the aftermath of 9/11 that “we also have to work through … the dark side …”, suggesting that because the “War on Terror” had migrated to U.S. shores, the U.S. would stray from constitutional rule-of-law protections, and that extreme measures – perhaps even including lifting privacy protections under the Foreign Intelligence Surveillance Act (FISA) of 1978 – might be taken.

However, the legal opinion issued by the Justice Department exceeded its authority, since the clause under Article 2, Section 2 does not provide for any executive powers beyond that granted the President as commander-in-chief of the U.S. military. It reads: “The President shall be Commander-in-Chief of the Army and Navy of the United States, and of the Militia of the several States, when called into the actual Service of the United States.”

The straightforward language does not grant the President the power to ignore other provisions of the Constitution or to dismiss any Public Law enacted by Congress; but shortly after 9/11, that overreach was exactly what the OLC set about to “legalize” in its series of opinion memorandums.

Despite Legal Reversals, Constitutional Abuse Unabated

In 2008 the OLC issued two reversals of the earlier post-9/11 OLC opinions of John C. Yoo, former Deputy Assistant U.S. Attorney General. The 2008 opinion issued by Steven G. Bradbury, Principal Deputy Assistant Attorney General urged that caution be exercised before relying on the Feb. 8, 2002 OLC legal opinion that the Authorization for Use of Military Force (AUMF) of Sept. 18, 2001, P.L. No. 107-40, 115 Stat. 224 (2001) be used as a precedent to conduct warrantless surveillance for the prevention of catastrophic attacks on the United States, since that 2002 interpretation of the AUMF no longer reflected the current views of the OLC.

Bradbury also took issue with the Sept. 25, 2001 OLC opinion recognizing court precedent that “deadly force is reasonable under the Fourth Amendment if used in self-defense or to protect others” and by extension of that recognition, that the “[G]overnment’s heightened interest in self-defense justifies the use of deadly force, then it certainly would also justify warrantless searches.”

Mr. Bradbury opined that by applying the deadly force principle and the Fourth Amendment’s “reasonableness” standard to warrantless searches, the fact-dependent nature of the Fourth Amendment’s “reasonableness” review is absent and is not necessarily the same “in its inception and in its scope” as is the constitutionality of the use of deadly force. Here, six years ago, the U.S. is provided two separate OLC reversals of the purported “legal” basis behind warrantless domestic surveillance, but Congress has persisted in allowing two Administrations to subvert our Constitution!

Congressional Floundering

When the Edward Snowden revelations began to appear in newsprint in 2013, a strong public outcry immediately arose demanding legislation to rein in unconstitutional Government practices of the post-9/11 Surveillance State. In response, Congress drafted numerous bills to reform procedures and processes that were considered objectionable.

Several laudable attempts at reform came close to being adopted, most notably the Amash-Conyers Amendment to the 2014 National Defense Authorization Act that suffered a narrow 205-to-217 defeat; the USA Freedom Act that failed by a mere two votes in the Senate; and the Massie-Lofgren Amendment to the 2015 Defense Appropriations bill that passed the House by a large 293-123 bipartisan margin but was stripped from the 2015 Omnibus spending bill by our congressional leaders.

Sadly, the efforts of numerous members of Congress failed to sway the congressional leadership despite a clear message from their constituents that they valued privacy and other constitutional rights and rejected the idea of sacrificing those freedoms for the sake of ostensible security. It now appears unlikely Congress will take decisive action to curtail flagrantly egregious surveillance practices that were authorized through prior legislation and which remain in effect today.

Preventive Failure

In retrospect, did post-9/11 domestic surveillance provide the U.S. with any effective protection from the 2009 Fort Hood shooting, the 2009 Northwest Air Flight 253 underwear bomber, the 2010 Times Square car bomber, or the 2013 Boston Marathon bombers? Did comprehensive global surveillance prevent the Charlie Hebdo and Jewish market massacres in France?

The resulting data glut clouds the search with irrelevant data and impedes uncovering and interdicting emerging terror plots. The comprehensive collection of all the world’s communications and wide focus on parties within “a second or third hop query” from known targets remains a messy operating concept – especially given the burgeoning of various social media – when so many of the communicants caught up within such winnowing are entirely innocent from any association with terrorism. The result has been that the communications of active terrorism planners have found sanctuary in the data garbage dump created by NSA.

However, there are some plausible explanations for the practice of gathering and storing all the world’s communications. The resultant repositories can provide a comprehensive historical body of information source for analyzing communications transactions for the entire post-2001 activities of any person, friend or foe. Although this does not help to “connect the dots” that might prevent a terrorist attack, after-the-incident investigators can benefit from non-constitutional “laws” and often secret interpretations of those laws.

NSA data is routinely shared with law enforcement in some cases to help target and launch investigation of non-terrorism related (e.g. drug trafficking, tax fraud) criminal suspects. The practice of “parallel construction” can hide the fact that NSA-collected data was instrumental in tipping law enforcement and providing the original indication of criminal activity. But this practice arguably circumvents citizens’ Fourth and Fifth Amendments rights.

A second useful application of such comprehensive communication repositories is that it can assist forensic investigations into terrorist events after they’ve occurred. It may have value in more quickly identifying individuals associated with the subjects responsible for past events. But for interdicting terrorist activity in advance, Keith Alexander’s approach remains too unfocused, and any successes achieved will be more likely attributable to chance.

Snowden Revelations

A sampling of Snowden revelations documented by Glenn Greenwald in his 2014 book, No Place to Hide, reflects the extent to which the U.S. Government has trampled on the Constitution

–Page 30. When repeatedly questioned by members of the Senate Select Committee on Intelligence seeking an estimate of how many Americans were subjected to having their phone calls and Internet traffic collected, intelligence officials responded that they did not maintain such data. Such denials proved to be clear cases of contempt of Congress as evidenced by the revelation of the BOUNDLESS INFORMANT program, an NSA system that maintained statistics on daily telephone and email collection activity. One example reflected one element in NSA had obtained more than three billion communications “from US communication systems alone” during a 30-day period in early 2013.

–Page 98. Former NSA Director Keith Alexander’s goal of mastering the Global Network by collecting all communications traffic can be seen as progressing smoothly based on a 2012 chart entitled “Example of Current Volumes and Limits.” The chart boasts collection of approximately 25 billion Internet sessions plus 15 billion telephone communications for early May 2012. These figures represent daily collection activity that is acquired, stored, and subjected to some cursory analysis.

–P. 111. The PRISM program targets Internet transactions by accessing the storage files maintained by ten popular and cooperative application service providers. One message excerpt reflects that PRISM was the most credited source of all NSA collection assets in fiscal year 2012 and cited to have contributed 15.1% of all intelligence reports issued. Anyone who has used Gmail, Facebook, Hotmail, Yahoo, Google, Skype, Paltalk, YouTube, AOL, or Apple applications on a computer or smart phone since September 2001 can assume their activity is safely stored in a Government data warehouse for retrospective search and analysis whenever the need arises, be it for legitimate legal purpose, some form of abusive harassment, or blackmail.

–P. 114. Although the post-9/11 rationale for warrantless domestic surveillance was for supporting the war on al Qaeda and terrorism, an April 3, 2013 message announcing that PRISM processing of Skype collection had been applied in NSA reporting with “terrorism, Syrian opposition and regime, and exec/special series reports being the top topics” and that over 2000 reports had “been issued since April 2011 based on PRISM Skype collection.” This evidence is a bold admission that the original justification for extensive domestic surveillance for interdicting al Qaeda has experienced broad mission creep.

–P. 116. The unconstitutional law enforcement practice of aiding criminal investigations through the use of “parallel construction” using NSA data was first reported by Reuters on Aug. 5, 2013. That report identified the existence of the Special Operations Division composed of two dozen partner agencies including NSA, CIA, FBI, DEA, IRS, and DHS.

A message entitled “Expanding PRISM Sharing With FBI and CIA” dated Aug. 31, 2012, announced that NSA’s “Special Source Operations (SSO) has recently expanded sharing with the Federal Bureau of Investigations (FBI) and the Central Intelligence Agency (CIA) on PRISM operations via two projects. . . . The FBI and CIA then can request a copy of PRISM collection from any selector, as allowed under the 2008 Foreign Intelligence Surveillance Act (FISA) Amendments Act law.” Thus, law enforcement entities have access to data gathered under the guise of laws enacted to counter terrorism to investigate non-terrorism related criminal activities.

–P. 125. In many instances of public testimony given by NSA leadership, the Director of National Intelligence, and the President, Americans have repeatedly been assured the public has nothing to fear as dossiers are not being gathered on us and that U.S. communications are protected by cautious and effective oversight through a process known as “minimization.”

A Memorandum of Understanding between NSA and the Israeli intelligence service states, “NSA routinely sends ISNU [the Israeli SIGINT National Unit] minimized and non-minimized raw collection.” How then are American communications being protected once collected by our Government and shared with foreign nations in the raw without having undergone minimization, the process by which the identifying attributes of U.S. persons are removed? Obviously, American elected and appointed officials have been spinning fact into fiction when it comes to the subject of minimization being an effective mechanism to protect privacy.

–P. 128. U.S. Government leaders repeatedly have assured the public that the Foreign Intelligence Surveillance Court (FISC) protects the public’s legal interests as a representative of the Judicial Branch. While the FISC is composed of judges, they are appointed by the Chief Justice and sit ex parte in secret with only Government lawyers present. The FISC is considered an Article II court, as opposed to an Article III court familiar to most Americans. Hence they do not represent the Judicial Branch, but rather the Executive Branch and claims they fulfill the third branch of government oversight, in addition to the Executive and Legislative Branches, are not grounded in truth.

The FISC repeatedly is accused of acting as a “rubber stamp” for Government’s requests for warrant authorization. Greenwald reports that throughout the period of 1979 – 2012, only eleven (11) applications for warrants were rejected, while it “approved over twenty thousand requests.” According to Wikipedia, the cumulative warrants issued by the FISC totaled 33,942 through 2012. Whichever number is closer to actuality, the message is clear that the Executive Branch pretty much gets its way, and the FISC does not appear to have the public’s privacy interests at heart.

–P. 153 – 160. The X-KEYSCORE system is described through a series of slides indicating that its use by analysts provides capabilities for both real-time and historical recovery of each keystroke, thus permitting the reconstruction of every communication session performed by unsuspecting Internet users, even against the U.S. persons not involved with terrorism. Further, images and documents attached to emails can also be examined by the system. Any oversight of its use by analysts is limited to an after-the-fact review of the justification entered by the analyst for the basis of his/her query.

As one might deduce, such a system targeting the world’s Internet traffic vacuums up enormous quantities of data packets. A report mentioned on p. 159 states, “At some sites the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours based on available resources.” With volumes like that obtained by NSA’s numerous collection facilities, it’s understandable why central storage facilities such as the behemoth Utah Data Center had to be constructed.

The Risks of Permanent Privacy Loss

Americans have been living under the Surveillance State now for over 13 years, and no measures have been instituted to protect U.S. citizen privacy, only to lessen it though the authorization of the Patriot Act and the Foreign Intelligence Surveillance Act (FISA) Amendments Act (FAA). Shallow claims have been made by Presidents Bush and Obama, former NSA Directors Mike Hayden and Keith Alexander, Director of National Intelligence Jim Clapper, and congressional leaders including Senator Dianne Feinstein, Congressman Dutch Ruppersberger, and former Congressman Mike Rogers in attempts to reassure citizen privacy is safely protected using rhetoric claiming the Government is only searching for terrorist communications.

But after all the lies and denials, how are U.S. citizens to trust politicians and intelligence officials to uphold the Constitution and particularly, the First and Fourth Amendments? The U.S. Government’s past history of abusive surveillance practices is not to be ignored.

In 1956, the FBI initiated a classified program known as the Counter Intelligence Program (COINTELPRO) that focused on organization surveillance and infiltration with the intent to disrupt and hamper political dissidents. FBI COINTELPRO agents spied upon individuals associated with the civil rights movement, including the National Association for the Advancement of Colored People, the Southern Christian Leadership Council, and the Congress of Racial Equality as well as activists supporting the American Indian Movement and women’s rights, and opponents of the Vietnam War.

COINTELPRO finally was terminated 15 years later in 1971 after private citizens took a page from the FBI handbook and broke into a Pennsylvania FBI field office stealing incriminating documents that exposed the program, releasing them to the media.

Between 1967 – 1973, NSA operated the MINARET program targeting the communications of over 1,600 U.S. organizations and citizens on behalf of the FBI, CIA, Secret Service, Defense Department, and Bureau of Narcotics and Dangerous Drugs, none supported by a warrant certified by a judge. In 1969, almost 150,000 telephone calls, telegrams, and cablegrams were being collected and analyzed monthly at NSA.

Freedom of speech and self-expression were under assault by the FBI and NSA during the 50s, 60s, and 70s. Today, with congressional backing through the Patriot Act and the FAA, augmented by an absence of any truly meaningful oversight, population surveillance has returned but on a much more grandiose scale. Consequently, with the risks associated with wide-scale sharing of the acquired data, the potential for abuse is alarmingly elevated.

The Fear Factor

If Americans want to actively protest U.S. Government policies, but are aware that their communications are being monitored, some individuals will be fearful, inclined toward self-censorship and less likely to speak out – with the chilling effect of being denied their First Amendment rights to free speech and association.

Is this the state of freedom Americans choose to live under? It was achieved through a cooperative Congress and an anxious news media that reacted on the basis of a fear-mongering Intelligence and Law Enforcement Community backed by profiteers from the private sector eager to come to the rescue with all manners of big data analytics solutions. Over the ensuing years, public malaise seems to have set in yielding a general sense of resignation over the loss of privacy wherein it’s viewed to be a small price to pay for the convenience of having perpetual electronic access within reach 24/7.

Few seem to understand what is at stake, let alone know what to do about it. Indeed the Founders fought the American Revolution after King George III forced colonists to house British troops in their homes where they could monitor behavior. Two hundred and forty-five years later, the public must realize that liberty, once lost, is seldom regained, and the freedom of privacy that American citizens enjoyed before September 11, 2001, is now forever lost unless the Government acts quickly to restore these rights.

Since such Government action is unlikely to take place absent public pressure, the public should strongly demand reforms before three key Surveillance State authorities, set to expire in June 2015, are brought up for renewal by hawkish congressmen – Section 215, the Lone Wolf provision, and the roving wiretap provision. The disclosures of assaults to our basic freedoms that have come to light since June 2013 are not solely threats to our privacy but also to the Republic itself.

Presidential Action Needed

The December 2013 report by the President’s Review Group on Intelligence and Communications Technologies stated “surveillance of American phone metadata has had no discernible impact on preventing acts of terrorism.” The study concluded that the searches under two provisions, Section 215 of the Patriot Act and Section 702 of the 2008 FISA Amendments Act, that purportedly authorize NSA bulk collection of U.S. citizens’ phone and Internet metadata were far less effective in detecting alleged terrorists than the NSA and Obama administration had reported.

Shortly after the Review Group issued its report, President Obama signed a Presidential Policy Directive on Signals Intelligence Activities (PPD-28) on Jan. 17, 2014. But although PPD-28 specifies limitations on bulk collection, a number of loopholes render the Directive useless – a mere whitewash of the problem.

Moreover, any hope that the U.S. Courts will rescue the country from its constitutional crisis remains a low probability. In most cases the Government argues that plaintiffs lack standing due to lack of proof of personal harm often resulting in suit dismissal. In contesting NSA eavesdropping complaints that surmount the legal challenge of establishing “standing,” the courts have applied a poorly reasoned precedent from Smith vs. Maryland where individuals do not have a reasonable expectation of privacy in the phone numbers they dial.

In Smith vs. Maryland, only one phone number was monitored, whereas current bulk collection based on Smith clearly violates the Fourth Amendment constraint of “particularity.” The only NSA surveillance case to be elevated to the Supreme Court, Clapper vs. Amnesty International USA, resulted in a 5-4 dismissal without trial based on plaintiffs’ lack of standing because they could not prove they had been monitored. Again, the Government said the information that would provide such proof is classified, hence not available for disclosure.

If Congress fails to act on restoring the First and Fourth Amendments to their proper standing, the President should issue an Executive Order that fully restores the legal protections inherent in the original Foreign Intelligence Surveillance Act and halts application of unconstitutional authorities granted under E.O. 12333 thus forcing Congress to repeal the FISA Amendments Act and Section 215 of the Patriot Act.

U.S. Government administrators, members of Congress, and former NSA Directors cite the need to balance privacy with security, placing far greater weight on favoring security. But is it really true that security is gained only at the expense of a loss of privacy? The answer is no!

An equal or greater level of security can be achieved with little or no loss in privacy protections if the U.S. Government were to adopt some modest changes in its surveillance operations. Furthermore, security will ultimately be enhanced if public discussions of national security policy were encouraged rather than chilled through cover of state secrets and fear of reprisal. The Framers of the Constitution intended public discussion, the wisdom of which has been confirmed by failures of closed government systems.

First, the homegrown and imported terrorism risk can be more effectively dealt with through more careful review of passports, including visa waiver programs, and scrutiny of other travel documentation indicating travel to/from known war zones and terrorist training areas.

Second, no U.S. person is to be treated by general FISC warrants. Bulk electronic surveillance previously supported under Sec. 215 of the Patriot Act and Sec. 702 of the FAA should be banned. Storage and analysis of any U.S. person metadata and/or content previously made possible through general FISC warrants, must be conducted with a specific warrant describing the person or thing to be searched and supported by satisfaction of the probable cause standard.

Application of the low standard known as “reasonable articulable suspicion” is not an acceptable metric for acquiring, storing, or analyzing the electronic communications of any U.S. person. (As defined under FISA, “United States person” means a citizen of the United States, an alien lawfully admitted for permanent residence, an unincorporated association a substantial number of members of which are citizens of the United States or aliens lawfully admitted for permanent residence, or a corporation which is incorporated in the United States, but does not include a corporation or an association which is a foreign power).

Third, in the normal course of electronic surveillance activity, data associated with a private U.S. person whose communications are incidentally acquired (i.e. not intentionally targeted) in the course of an authorized and targeted collection activity is to immediately be subjected to an anonymization process.

All personally identifying attributes associated with the person are thus to be encrypted and remain encrypted in storage until a specific warrant is obtained (should probable cause develop) from the FISC permitting decryption of the person’s identifying attributes (e.g. name, address, phone number, SIM card number, IP address, domain name server address). The anonymization of the data would take place prior to recording in any form of storage, and would also apply to any U.S. person engaging in communication with terrorist targets or their web sites – whether intentional or unintentional.

With these few changes, sufficient security could be maintained with more focused targeting. Most pre-9/11 privacy protections could then be restored. U.S. Government data warehouses would no longer be cluttered with the electronic communications of innocent persons — shrinking the digital haystack to focus on targets for which surveillance is supported by “probable cause.”

But it is not enough to restore the privacy rights of U.S. citizens. There must also be a formal, comprehensive government-wide review of surveillance operations, followed by the enactment of reforms. Furthermore, regular ad hoc “surprise” inspections and technology-enabled audits of surveillance system information technology components should be conducted by trained U.S. Government officials and be completely independent and unobstructed.

Any individual or agency found to have violated the law by overstepping surveillance restrictions should face immediate accountability, including termination and revocation of security clearances as warranted, and be appropriately charged under the relevant U.S. laws.

Edward Loomis (NSA, ret.) is the principal drafter of this Memorandum. It updates the Jan. 7, 2014 VIPS Memorandum for the President, from former senior NSA officials, entitled “Input for Your Decisions on NSA.”

For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)

William Binney, former Technical Director, World Geopolitical & Military Analysis; Co-founder of the SIGINT Automation Research Center

“Since the events of September 11, 2001, actions by successive U.S. administrations – backed by legislation such as the Patriot Act and the FISA Amendments Act (FAA) – have eroded privacy provisions guaranteed under the U.S. Constitution… Following the 9/11 attack, the Office of Legal Counsel (OLC) at the Department of Justice issued a series of legal opinions asserting that the President’s commander-in-chief powers vis-a-vis the so-called “Global War on Terror” were not to be challenged by the legislative or judicial branches.”

First, no one who serves within our governments – state or federal – were given the authority to decide what “powers” they have. The Founders made that clear. Those who serve are not only under a contract to do ONLY what is assigned to them by the US Constitution, and take an Oath making them PERSONALLY responsible for their actions and non actions while serving. Not only that, but since it is the contract under which they operate when they broke the Oath, a felony and the crime of Perjury – plus broke the contract that they are under, and all who are familiar with contract law understands that means that NONE of them that did so now meet the requirements of the position or office they are occupying anymore.

That would meant that those who serve/served within the Office of Legal Counsel (OLC) at the Department of Justice were committing treason against the American people and the US Constitution. There is NO statute of limitations on prosecuting traitors to the USA. For those of you who are still not informed about our type of government, we are a Constitutional Republic, and the count of all authority comes from the people. Treason is actions taken against the American people, their US Constitution, their chosen way of life.

“Office of Legal Counsel (OLC) at the Department of Justice issued a series of legal opinions
asserting that the President’s commander-in-chief powers vis-a-vis the so-called “Global War on Terror” were not to be challenged by the legislative or judicial branches. ”

Except that “terror” is a tactic, and one cannot call for a “war on a tactic. Plus it is VERY clear that the executive and judicial branches was NEVER given the authority to declare war on anything.

Those that enforce those unlawful laws, regulations, etc are made into criminals and quite possible traitors to the USA – think not? Go Read the Nuremberg Trials.

Patriot Act, the FISA Amendments Act (FAA), warrantless surveillance, the actions of those who serve within the NSA and the TSA, and the DHS are all taken against the American people, which is treason. When force is used or threatened it is also *Terrorism against the American people and the USA.

* 28 C.F.R. Section 0.85 Terrorism is defined as “the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives”.

Thomas Jefferson: “The government created by this compact (the Constitution) was not made the exclusive or final judge of the extent of the powers delegated to itself; since that would have made its discretion, and not the Constitution, the measure of its powers; but that, as in all other cases of compact among powers having no common judge, each party (the people of each state) has an equal right to judge for itself, as well of infractions as of the mode and measure of redress.”

James Madison, Federalist 47: “The accumulation of all powers, legislative, executive, and judiciary, in
the same hands, whether of one, a few, or many, and whether hereditary, selfappointed, or elective, may justly be pronounced the very definition of tyranny… The magistrate in whom the whole executive power resides cannot of himself… administer justice in person, though he has the appointment of those who do administer it.”

Thomas Jefferson: “Our peculiar security is in the possession of a written Constitution. Let us not
make it a blank paper by construction.”

James Madison: “Do not separate text from historical background. If you do, you will have perverted and subverted the Constitution, which can only end in a distorted, bastardized form of illegitimate government.”

Alexander Hamilton: “Every act of a delegated authority, contrary to the tenor of the commission under which it is exercised, is void. No legislative act, therefore, contrary to the Constitution, can be
valid. To deny this, would be to affirm, that the deputy is greater than his principal; that the servant is above his master; that the representatives of the people are superior to the people themselves;
that men acting by virtue of powers, may do not only what their powers do not authorize, but what they
forbid.”

Thomas Jefferson: “I consider the foundation of the Constitution as laid on this ground: That “all powers not delegated to the United States, by the Constitution, nor prohibited by it to the States, are reserved to the States or to the people.”To take a single step beyond the boundaries thus specially drawn around the powers of Congress, is to take possession of a boundless field of power, no longer susceptible of any definition.” (Remember, the ONLY branch that can create laws and regulations is those representatives the people send to the legislative branch. It is forbidden to those who serve within the other two branches.)

Thomas Jefferson: “The several States composing, the United States of America, are not united on the principle of unlimited submission to their general government; but that, by a compact under the style and title of a Constitution for the United States, and of amendments thereto, they constituted a general government for special purposes – delegated to that government certain definite powers, reserving, each State to itself, the residuary mass of right to their own self-government; and that whensoever the general government assumes undelegated powers, its acts are unauthoritative, void, and of no force: that to this compact each State acceded as a State, and is an integral part, its co-States forming, as to itself, the other party: that the government created by this compact was not made the exclusive or final judge of the extent of the powers delegated to itself; since that would have made its discretion, and not the Constitution, the measure of its powers; but that, as in all other cases of compact among powers having no common judge, each party has an equal right to judge for itself, as well of infractions as of the mode and measure of redress.”

Alexander Hamilton, Federalist 69: “The one (a president) can confer no privileges whatever; the other [the king] can make denizens of aliens, noblemen of commoners; can erect corporations with all the rights incident to corporate bodies.”

Alexander Hamilton: “Nothing was more to be desired than that every practicable obstacle should be
opposed to cabal, intrigue, and corruption. These most deadly adversaries of republican government might naturally have been expected to make their approaches from more than one querter, but
chiefly from the desire in foreign powers to gain an improper ascendant in our councils. How could they better gratify this, than by raising a creature of their own to the chief magistracy of the Union?”

James Madison, Federalist 14: “In the first place, it is to be remembered, that the general government is not to be charged with the whole power of making and administering laws. Its jurisdiction is limited to certain enumerated objects, which concern all the members of the republic, but which are not to be attained by the separate provisions of any”.

From James Wilson’s “State House Yard Speech”: “everything which is not given is reserved.” Wilson said that power in the Constitution is not granted by “tacit implication, but from the positive grant expressed in the instrument of the union.”

Where does the allegiance of the American people, the US (not the UN) Military, the LEA’s – state and federal, and those who serve within our governments – state and federasl belong? Not to any individual who serves within our governments – not to any person, entity, office, group, but to the US Constitution. This is verifiable by the REQUIRED Oaths.

J. Reuben Clark: “God provided that in this land of liberty, our political allegiance shall run not to individuals, that is, to government officials, no matter how great or how small they may be. Under His
plan our allegiance and the only allegiance we owe as citizens or denizens of the United States, runs to our inspired Constitution which God himself set up. So runs the oath of office of those who participate in government. A certain loyalty we do owe to the office which a man holds, but even here we owe just by reason of our citizenship, no loyalty to the man himself. In other countries it is to the individual that allegiance runs. This principle of allegiance to the Constitution is basic to our freedom.
It is one of the great principles that distinguishes this “land of liberty” from other countries”.

Lets see what the Preamble to the US Constitution and the Preamble to the Bill of Rights say about those who serve within our governments.

Preamble to the US Constitution: “We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defence, promote the
general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and
establish this Constitution for the United States of America.”

Notice that no where within this Preamble does it mention that it is any of those who serve within any branch of the state or federal government whose duty it is to establish those things listed. It is the People of the United States duty to do those things.

Preamble to the Bill of Rights: “Congress of the United States begun and held at the City of New-York, on Wednesday the fourth of March, one thousand seven hundred and eighty nine.

THE Conventions of a number of the States, having at the time of their adopting the Constitution, expressed a desire, in order to prevent misconstruction or abuse of its powers, that FURTHER DECLARATORY AND RESTRICTIVE CLAUSES SHOULD BE ADDED: And as extending the ground of
public confidence in the Government, will best ensure the beneficent ends of its institution.
RESOLVEDby the Senate and House of Representatives of the United States of America, in Congress assembled, two thirds of both Houses concurring,that the following Articles be proposed to the Legislatures of theseveral States, as amendments to the Constitution of the United States, all, or any of which Articles, when ratified by three fourthsof the said Legislatures, to be valid to all intents and purposes, aspart of the said Constitution; viz. ” (Caps are mine)

“Further” means more restrictions and declaratory clauses to make clear that those who serve within our government are LIMITED in what they are ALLOWED to do. That is put into writing and backed by an Oath – so it is the strongest contract anyone can be under.

Those today, and in our very recent history who advocate the “living document” doctrine typically point to several clauses within the Constitution’s text to justify these views. The clauses which are sometimes referred to the “elastic clauses.” They are lying or misinformed.

One of the “elastic clauses” is the Necessary and Proper Clause, which is sometimes used by government to justify a variety of “implied” powers. James Wilson, a leading supporter of the Constitution in Pennsylvania, explained that this prose did no such thing. Wilson stated: “the
concluding clause, with which so much fault has been found, gives no more, or others powers; nor does it in any degree go beyond the particular enumeration.” The clause’s text makes this very clear as it written in a distinctively clear manner:

“To make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers.”

The Necessary and Proper Clause only gives Congress the ability to perform tasks incidental to carry out the specified enumerated (listed) powers. As Edmund Randolph said when responding to Patrick Henry regarding the clause: “The gentleman supposes, that complete and unlimited legislation is vested in the United States. This supposition is founded on false reasoning… in the general constitution, the powers are enumerated.”

Another “elastic clause” the General Welfare Clause is another which is used to rationalize the living document model, the portion of Article I, Section 8 which gives Congress the power to “provide for the common Defence and general Welfare.” Yet, the clear legal meaning of the phrase, which was borrowed from the Articles of Confederation, meant a small subset of duties each individual state
considered appropriate to delegate to a separate authority. Nothing more.

Roger Sherman (he was the one who moved to have the phrase added to the Constitution) wanted to make it explicit that taxes could only be collected for the specified enumerated powers easily clarifies its meaning. He made the observation that the “objects of the Union” were “few.”He then listed “defence against foreign danger,” defense “against internal disputes & a resort to force,” “defence against foreign danger,” and “regulating foreign commerce & drawing revenue from it” as the powers assigned to the general government. This is entirely consistent with Madison’s words from The
Federalist and other sources, and was the conclusive understanding that the other representatives held in the Philadelphia Convention and the state conventions afterward.

James Madison wrote this about the General Welfare Clause’s meaning: “I, sir, have always conceived – I believe those who proposed the Constitution conceived, and it is still more fully known, and more
material to observe that those who ratified the Constitution conceived –that this is not an indefinite Government, deriving its power from the general terms prefixed to the specified powers, but a limited Government tied down to the specified powers which explain and define the general terms.”

James Madison said that the interstate and foreign commerce clauses were not intended, nor construed, to vest in Congress equivalent powers when regulating domestic and foreign commerce: “I always foresaw difficulties might be started in relation to the interstate commerce power. Being in the same terms with the power over foreign commerce, the same extent, if taken literally, would belong to it. Yet it is very certain it grew out of the abuse of the power of the importing states in taxing the non-importing, and was intended as a negative and preventative provision against injustice amongst the states themselves, rather than as a power to be used for the positive purposes of the General Government, in which alone, however, the remedial power could be lodged. And it will be safer to leave the power with this key to it, than to extend it all the qualities and incidental means belonging to the power over foreign commerce.”

Thomas Jefferson: “Congress has not unlimited powers to provide for the general welfare, but only
those specifically enumerated.”

James Madison: “With respect to the words “general welfare,” I have always regarded them as qualified by the detail of powers connected with them. To take them in a literal and unlimited sense would be a metamorphosis of the Constitution into a character which there is a host of proofs was not contemplated by its creators.”

Instead of using politispeak to whitewash the unlawful changes and usurpations done by those who serve(d) within our governments let’s call it what is, they are the ones “revolting” trying to unlawfully change our legitimate government, the contract that they are under, the Supreme LAW of this land, and many have been injured or killed, which is treason against the American people, the US Constitution.

9/11 was the kick-off, the inciting event for the current milleau of false fear and legitimized control through national security powers. The act of realizing its true false flag nature negates the engineered paradigm in theory, but sustained opposition to it eventually frees the individual from its system of control and undoes it.

Joe

Sigh. Once again conflating the Bill of Rights with the Constitution, the former having been insisted upon by those against the Constitution, and the latter being subtitled The Rich White Man’s Guide to Subjugating a Continent. Get a grip, and get a real constitution, like the Swiss Constitution or the German Basic Law.

FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of political, economic, scientific, and educational issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: